Categories
Computer science

Data transfer faces many security challenges, and hence, any protocols have been

Need Help With your assignment? Get expert academic writing assistance! We can write any paper on any subject within the tightest time.

Hire A Writer

Data transfer faces many security challenges, and hence, any protocols have been introduced to protect data while at motion. In this phase, you will be required to analyze one of these protocols. You will choose one of the protocols from the below list: HTTPS SSH 802.11 PGP You will describe the purpose of your chosen protocol and research that protocol. You will then answer these questions in your submission: What are some of the attacks that can be carried on this protocol? What cryptographic algorithm is used in this protocol? Examine the algorithm used and explain its steps. What are similar competitors that achieve the same security goals? What software/systems use these protocols? Your paper should provide instructions on how to install and maintain these protocols. For HTTPS, you should provide instructions so that a web server can serve HTTPS pages. For SSH, you should provide instructions so an organization can provide SSH access to its machines. For PGP, you should provide instructions so an email system can utilize PGP. For 802.11, you should provide instructions so a company has a secure wireless network. Your submission should be at least 1200 words, and you should utilize at least 4 different credible references. Upload Instructions: Select the Submit Assignment button to the right. Click Choose File, located in the File Upload box. Navigate to your file location. Once the file is located, select it and then select the Open button. Click Submit Assignment to complete the upload process.

Need Help With your assignment? Get expert academic writing assistance! We can write any paper on any subject within the tightest time.

Hire A Writer

Leave a Reply